Jan 7, 2020 | Methodology, Security, Threat Modeling, Threat Modeling Process, ThreatModeler
When threat modeling methodologies first moved from theory to application in the early 2000s, completing one model for every 40 hours of personnel resource was considered acceptable. Increasingly, internal compliance, external regulatory pressures and financial...
Oct 29, 2019 | Attack Surface Analysis, Threat Modeling Process, Threat Modeling Tools
Process follow diagrams, also known as process flow charts, help organizations to map out business processes. Process flow diagrams are visual tools that help to explain certain processes that occur, oftentimes in sequential order. Process flow diagrams lend...
Oct 1, 2019 | Attack Surface Analysis, DevSecOps, Threat Modeling Process, Threat Modeling Tools
Within the context of information security, application threat modeling seeks to identify, understand and communicate threat information to security decision makers. Threat modeling can be used to secure system networks, applications, mobile, web, Internet of Things...
Sep 26, 2019 | Attack Surface Analysis, CISO, DevSecOps, Events, Methodology, Threat Modeling Process
On Friday, September 20, 2019, the Cyber Tech Accord invited ThreatModeler to speak on its panel appearing at the 2nd Annual Cybersecurity Summit. Alex Bauert, CISSP, CSSLP – ThreatModeler’s Senior Director of Threat Research – sat alongside esteemed Tech Accord panel...
Sep 10, 2019 | Attack Surface Analysis, DevSecOps, Methodology, Threat Modeling Process, Threat Modeling Software
Here at ThreatModeler HQ, we’ve had conversations with customers recently, each telling a similar story. Business owners are signing exceptions to launch products without conducting a complete risk analysis. The reason? Project leaders invested time in manual threat...
Aug 7, 2019 | IoT Cybersecurity, Methodology, Security, Threat Modeling, Threat Modeling Process, Threat Models, ThreatModeler
Internet of Things (IoT) solutions are trending at an explosive rate, especially in the business world. With an exponential increase in devices that connect to the internet, businesses see huge benefits for communications and productivity. However, this can also leave...